My Account Details

ISBN10: 1260456749 | ISBN13: 9781260456745

Step 1 . Download Adobe Digital Editions to your PC or Mac desktop/laptop.
Step 2. Register and authorize your Adobe ID (optional). To access your eBook on multiple devices, first create an Adobe ID at account.adobe.com. Then, open Adobe Digital Editions, go to the Help menu, and select "Authorize Computer" to link your Adobe ID.
Step 3. Open Your eBook. Use Adobe Digital Editions to open the file. If the eBook doesn’t open, contact customer service for assistance.
Publisher's Note: Products purchased from Third Party sellers are not guaranteed by the publisher for quality, authenticity, or access to any online entitlements included with the product. This effective study guide provides 100% coverage of every topic on the GPEN GIAC Penetration Tester exam This effective self-study guide fully prepares you for the Global Information Assurance Certification’s challenging Penetration Tester exam, which validates advanced IT security skills. The book features exam-focused coverage of penetration testing methodologies, legal issues, and best practices. GPEN GIAC Certified Penetration Tester All-in-One Exam Guide contains useful tips and tricks, real-world examples, and case studies drawn from authors’ extensive experience. Beyond exam preparation, the book also serves as a valuable on-the-job reference. Covers every topic on the exam, including: Pre-engagement and planning activities Reconnaissance and open source intelligence gathering Scanning, enumerating targets, and identifying vulnerabilities Exploiting targets and privilege escalation Password attacks Post-exploitation activities, including data exfiltration and pivoting PowerShell for penetration testing Web application injection attacks Tools of the trade: Metasploit, proxies, and more Online content includes: 230 accurate practice exam questions Test engine containing full-length practice exams and customizable quizzes
Chapter 2: Pre-Engagement Activity
Chapter 3: Penetration Testing Lab Setup
Chapter 4: Reconnaissance, Open Source Intelligence (OSINT)
Chapter 5: Scanning, Enumerating Targets and Vulnerabilities
Chapter 6: Exploiting Targets
Chapter 7: Advanced Metasploit
Chapter 8: Password Attacks
Chapter 9: Stealing Data, Maintaining Access and Pivoting
Chapter 10: PowerShell for Penetration Testing
Chapter 11: Web Application Hacking
Chapter 12: Proxies, Crawlers, and Spiders
Chapter 13: OWASP Top 10
Appendix A: Tools Reference
Need support? We're here to help - Get real-world support and resources every step of the way.